Research Article
Quantal Response Equilibrium-Based Strategies for Intrusion Detection in WSNs
Table 2
QRE calculations for the players Attacker and IDS agents in the RIDG.
| Step | | Attacker | IDS agents | Cooperate | Preattack | Attack | Sleep | Grant | Defend |
| 1 | 0 | | | | | | | 2 | 0.010248 | | | | | | | 3 | 0.021502 | | | | | | | 4 | 0.033854 | | | | | | | 5 | 0.047402 | | | | | | | 6 | 0.062251 | | | | | | | 7 | 0.078512 | | | | | | | 8 | 0.0963 | | | | | | |
⋮ | ⋮ | ⋮ | ⋮ | ⋮ | ⋮ | ⋮ | ⋮ | 47 | | | | | | | 1 | 48 | | | | | | | 1 | 49 | | | | | | | 1 | ⋮ | ⋮ | ⋮ | ⋮ | ⋮ | ⋮ | ⋮ | ⋮ | 89 | 161.049147 | | | 1 | 0 | 0 | 1 | 90 | 177.142263 | | | 1 | 0 | 0 | 1 | 91 | 194.844691 | | | 1 | 0 | 0 | 1 | ⋮ | ⋮ | ⋮ | ⋮ | ⋮ | ⋮ | ⋮ | ⋮ | 104 | 672.367387 | | 0 | 1 | 0 | 0 | 1 | 105 | 739.592327 | | 0 | 1 | 0 | 0 | 1 | 106 | 813.539761 | 0 | 0 | 1 | 0 | 0 | 1 |
|
|